Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 18 questions
Exam Code: A30-327                Update: Sep 13, 2025
Exam Name: AccessData Certified Examiner

AccessData AccessData Certified Examiner A30-327 Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

You currently store alternate hash libraries on a remote server. Where do you configure FTK to access these files rather than the default library, ADKFFLibrary.hdb?

A.

Preferences

B.

User Options

C.

Analysis Tools

D.

Import KFF Hashes

Question # 2

Click the Exhibit button.

What change do you make to the file filter shown in the exhibit in order to show only graphics with a logical size between 500 kilobytes and 10 megabytes?

A.

You change all file status items to a red circle.

B.

You change all file status items to a yellow triangle.

C.

You make no change. The filter is correct as shown.

D.

You change Graphics in the File Type column to a yellow triangle.

Question # 3

What is the most effective method to facilitate successful password recovery?

A.

Art of War

B.

Entropy Test

C.

Advanced EFS Attack

D.

Primary Dictionary Attack

Question # 4

What are three image file formats that can be read by FTK Imager? (Choose three.)

A.

E01 files

B.

raw (dd) image files

C.

SafeBack version 2.2 image files

D.

SafeBack version 3.0 image files

E.

Symantec Ghost compressed image files

Question # 5

In FTK, which search broadening option allows you to find grammatical variations of the word "kill" such as "killer," "killed," and "killing"?

A.

Phonic

B.

Synonym

C.

Stemming

D.

Fuzzy Logic

Question # 6

FTK uses Data Carving to find which three file types? (Choose three.)

A.

JPEG files

B.

Yahoo! Chat Archives

C.

WPD (Word Perfect Documents)

D.

Enhanced Windows Meta Files (EMF)

E.

OLE Archive Files (Office Documents)

Question # 7

In PRTK, which type of attack uses word lists?

A.

dictionary attack

B.

key space attack

C.

brute-force attack

D.

rainbow table attack

Question # 8

Using the FTK Report Wizard, which two options are available in the List by File Path

window? (Choose two.)

A.

List File Properties

B.

Export to the Report

C.

Apply a Filter to the List

D.

Include Registry Viewer Reports

Question # 9

Click the Exhibit button.

When decrypting EFS files in a case, you receive the result shown in the exhibit. What is the most plausible explanation for this result?

A.

The encrypted file was corrupt.

B.

A different user encrypted the remaining encrypted file.

C.

The hash value of the remaining encrypted file did not match.

D.

The remaining encrypted file had previously been bookmarked.

E.

An incorrect CRC value for the $EFS certificate was applied by the user.

Question # 10

What are three types of evidence that can be added to a case in FTK? (Choose three.)

A.

local drive

B.

registry MRU list

C.

contents of a folder

D.

acquired image of a drive

E.

compressed volume files (CVFs)

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 13 Sep 2025